Resubmissions
11/11/2023, 21:54
231111-1sgeesbg5t 811/11/2023, 21:52
231111-1rakgsbg3y 711/11/2023, 21:24
231111-z81mkabf5v 711/11/2023, 21:20
231111-z62f3scd27 711/11/2023, 21:19
231111-z6csqacd25 711/11/2023, 21:18
231111-z5pqwscc99 711/11/2023, 21:13
231111-z22laabf3w 911/11/2023, 21:10
231111-z1cwjacc82 711/11/2023, 20:08
231111-ywskracb37 7Analysis
-
max time kernel
77s -
max time network
1212s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2023, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
888Rat.exe
Resource
win10v2004-20231020-en
General
-
Target
888Rat.exe
-
Size
93.6MB
-
MD5
553951bbbde6c6001ade88f3a06a9b9a
-
SHA1
28cd84b4533433cc925123f106e4efbbddd3c2ca
-
SHA256
4870376811dd3c5eabe924c793079629d13a7813bf1a3014b5333b132be50365
-
SHA512
e9cf57ca2cd87fa2b3c05c0003ae11fc51d4139072d028ba52d665de57fffcb9c279cbe19ede001cc56ac464212ab8f6cbb8e7023c7ca567835a7b540a58521d
-
SSDEEP
1572864:ST0EdFgdUIGfkS0H4HHDXLYrXatfLllR3Rbop0+xXlMSyCXsRuG0CPb0V+8VM5km:ST0I1IGfr0H4HbLYrXajRPcl0issnM4s
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 51 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Windows-KB890830-x64-V5.118.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE -
Executes dropped EXE 46 IoCs
pid Process 3932 SERVERS.EXE 4884 SERVERS.EXE 2884 888RAT.EXE 4404 SERVERS.EXE 560 888RAT.EXE 3228 888RAT.EXE 5284 SERVERS.EXE 5452 SERVERS.EXE 5604 SERVERS.EXE 5828 SERVERS.EXE 6080 888RAT.EXE 4904 SERVERS.EXE 5340 888RAT.EXE 5696 SERVERS.EXE 5888 SERVERS.EXE 5784 888RAT.EXE 6052 SERVERS.EXE 2912 SERVERS.EXE 5284 SERVERS.EXE 5872 SERVERS.EXE 2924 888RAT.EXE 4564 Process not Found 5844 SERVERS.EXE 2952 SERVERS.EXE 1264 SERVERS.EXE 6036 888RAT.EXE 324 SERVERS.EXE 5564 SERVERS.EXE 5524 888RAT.EXE 2196 SERVERS.EXE 5804 SERVERS.EXE 6096 SERVERS.EXE 5904 Process not Found 3892 888RAT.EXE 1752 Process not Found 4432 SERVERS.EXE 5796 888RAT.EXE 4632 Process not Found 1120 SERVERS.EXE 5268 SERVERS.EXE 4864 888RAT.EXE 5516 888RAT.EXE 2804 SERVERS.EXE 2284 Process not Found 3520 Process not Found 1752 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GeForce = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\SERVERS.EXE\"" SERVERS.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5580 schtasks.exe 5988 Process not Found -
Delays execution with timeout.exe 1 IoCs
pid Process 3992 Process not Found -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3811856890-180006922-3689258494-1000\{2C9DD782-A12C-40C8-ABAD-D035F4B2F692} SERVERS.EXE -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5084 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 1380 msedge.exe 1380 msedge.exe 4856 taskmgr.exe 4856 taskmgr.exe 4412 msedge.exe 4412 msedge.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 3932 SERVERS.EXE 3932 SERVERS.EXE 3932 SERVERS.EXE 3932 SERVERS.EXE 3932 SERVERS.EXE 3932 SERVERS.EXE 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 5620 identity_helper.exe 5620 identity_helper.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4856 taskmgr.exe Token: SeSystemProfilePrivilege 4856 taskmgr.exe Token: SeCreateGlobalPrivilege 4856 taskmgr.exe Token: SeDebugPrivilege 3932 SERVERS.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4856 taskmgr.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4856 taskmgr.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe 4856 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3932 SERVERS.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4652 4412 msedge.exe 93 PID 4412 wrote to memory of 4652 4412 msedge.exe 93 PID 4008 wrote to memory of 1492 4008 888Rat.exe 302 PID 4008 wrote to memory of 1492 4008 888Rat.exe 302 PID 4008 wrote to memory of 1492 4008 888Rat.exe 302 PID 4008 wrote to memory of 3932 4008 888Rat.exe 96 PID 4008 wrote to memory of 3932 4008 888Rat.exe 96 PID 1492 wrote to memory of 3464 1492 SERVERS.EXE 97 PID 1492 wrote to memory of 3464 1492 SERVERS.EXE 97 PID 1492 wrote to memory of 3464 1492 SERVERS.EXE 97 PID 1492 wrote to memory of 4884 1492 SERVERS.EXE 98 PID 1492 wrote to memory of 4884 1492 SERVERS.EXE 98 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 3176 4412 msedge.exe 101 PID 4412 wrote to memory of 1380 4412 msedge.exe 100 PID 4412 wrote to memory of 1380 4412 msedge.exe 100 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 PID 4412 wrote to memory of 4668 4412 msedge.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4856
-
C:\Users\Admin\AppData\Local\Temp\888Rat.exe"C:\Users\Admin\AppData\Local\Temp\888Rat.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"2⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"3⤵
- Checks computer location settings
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"4⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"5⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"6⤵
- Checks computer location settings
PID:944 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"7⤵
- Checks computer location settings
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"8⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"9⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"10⤵
- Executes dropped EXE
PID:5604
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"10⤵PID:5572
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"11⤵PID:5784
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"12⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"13⤵
- Checks computer location settings
PID:5160 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"14⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"15⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"16⤵
- Checks computer location settings
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"17⤵PID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"17⤵PID:5824
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"18⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"19⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"20⤵
- Checks computer location settings
PID:5708 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"21⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"22⤵
- Checks computer location settings
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"23⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"24⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"25⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"26⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"27⤵PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"27⤵PID:6128
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"28⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"29⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"30⤵
- Checks computer location settings
PID:5592 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"31⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"32⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"33⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"34⤵
- Checks computer location settings
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"35⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"36⤵PID:5780
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"37⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"38⤵
- Checks computer location settings
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"39⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"40⤵
- Checks computer location settings
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"41⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"42⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"43⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"44⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"45⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"46⤵PID:5228
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"47⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"48⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"49⤵PID:5652
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"49⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"50⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"51⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"51⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"52⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"53⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"54⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"55⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"56⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"56⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"57⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"58⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"59⤵PID:5688
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"60⤵PID:5292
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"61⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"62⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"63⤵PID:6112
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"64⤵PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"64⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"65⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"66⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"67⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"68⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"69⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"70⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"71⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"72⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"73⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"74⤵
- Checks computer location settings
PID:6128 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"75⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"76⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"77⤵
- Executes dropped EXE
PID:560 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"78⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"79⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"80⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"81⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"82⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"83⤵PID:5488
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"83⤵PID:5732
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"84⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"84⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"85⤵
- Checks computer location settings
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"86⤵PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"86⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"87⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"87⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"88⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"89⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"90⤵PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"90⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"91⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"92⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"93⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"94⤵
- Executes dropped EXE
PID:5340 -
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"95⤵PID:5852
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"95⤵
- Checks computer location settings
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"96⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"97⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"98⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"99⤵PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"99⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"100⤵PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"100⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"101⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"102⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"103⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"104⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"105⤵PID:6112
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"106⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"107⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"108⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"109⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"110⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"111⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"112⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"113⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"114⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"115⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"116⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"117⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"118⤵PID:5760
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"119⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"120⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"121⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"122⤵PID:3732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-